shaddy43 / AES_Shellcode_EncryptorLinks
This repository contains a tool that can encrypt all type of files and give the encrypted output in the form of an encrypted shellcode. Process of encrypting shellcode is very important for injection processes to bypass signature based detection by the security controls.
☆16Updated 3 years ago
Alternatives and similar repositories for AES_Shellcode_Encryptor
Users that are interested in AES_Shellcode_Encryptor are comparing it to the libraries listed below
Sorting:
- A small Aggressor script to help Red Teams identify foreign processes on a host machine☆84Updated 2 years ago
- A python port of CCob's ThreadlessInject☆25Updated 2 years ago
- AMSI Bypass for powershell☆29Updated 3 years ago
- A proof-of-concept created for academic/learning purposes, demonstrating both local and remote use of VSTO "Add-In's" maliciously☆31Updated 2 years ago
- This code example allows you to create a malware.exe sample that can be run in the context of a system service, and could be used for loc…☆55Updated 2 years ago
- A .NET binary loader that bypasses AMSI☆45Updated 4 years ago
- Reverse TCP Powershell has never been this paranoid. (basically an Opsec-safe reverse powershell)☆31Updated 3 years ago
- Stealthy Loader-cum-dropper/stage-1/stager targeting Windows10☆37Updated 3 years ago
- 🚧 C# UAC Bypass technique using mock directories 🚧☆28Updated 3 years ago
- Exploits Scripts and other tools that are useful during Penetration-Testing or Red Team engagement☆66Updated 3 years ago
- Find kernel32 base and API addresses. Simple C++ implementation☆24Updated 3 years ago
- Small POC for process ghosting☆40Updated 3 years ago
- JALSI - Just Another Lame Shellcode Injector☆30Updated 4 years ago
- A Python script that embeds Target VBS into LNK and when executed runs the VBS script from within.☆32Updated 2 years ago
- Firefox webInjector capable of injecting codes into webpages using a mitmproxy.☆42Updated 3 years ago
- Another AMSI bypass - but in C++.☆24Updated 2 years ago
- A PoC weaponising CustomXMLPart for hiding malware code inside of Office document structures.☆39Updated 3 years ago
- C# project to Reflectively load .Net assemblies in memory☆18Updated last year
- Poc of using youtube comments for C2 communications☆10Updated 4 years ago
- This is a simple example of DLL hijacking enabling proxy execution.☆65Updated 2 years ago
- A more advanced free and open .NET obfuscator using dnlib.☆10Updated 3 years ago
- Extracting Clear Text Passwords from mstsc.exe using API Hooking.☆16Updated 6 years ago
- IOXIDResolver from AirBus Security/PingCastle☆51Updated 4 years ago
- A cross-platform assistant for creating malicious MS Office documents. Can hide VBA macros, stomp VBA code (via P-Code) and confuse macro…☆25Updated 3 years ago
- Yet, Another Packer/Loader☆25Updated 2 years ago
- Understanding WinRAR Code Execution Vulnerability (CVE-2023-38831)☆40Updated 2 years ago
- Run python from a single exe☆35Updated 3 years ago
- C# loader capable of running stage-1 from remote url, file path as well as file share☆15Updated 2 years ago
- Simple PoC Python agent to showcase Havoc C2's custom agent interface. Not operationally safe or stable. Released with accompanying blog …☆87Updated 2 years ago
- freeBokuLoader fork which targets and frees Metsrv's initial reflective DLL package☆34Updated 2 years ago